tpu-perf-model
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/compute_step.pycontains aneval()call within theeval_flopsmethod. This function evaluates mathematical formulas defined in theflops_formulafield of a user-provided JSON file. While the call uses a restricted dictionary for globals and builtins,eval()remains a significant security risk that can potentially be bypassed to execute arbitrary Python code if the input data is maliciously crafted. - [COMMAND_EXECUTION]: Integration tests in
scripts/test_integration.pyutilizesubprocess.run()to execute the skill's CLI tool, facilitating shell command execution within the environment. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdinstructions recommend usingnpx @mermaid-js/mermaid-clito render Mermaid diagrams. This operation downloads and executes themmdcutility from the NPM registry, a well-known and standard service for technology dependencies. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its handling of external data files.
- Ingestion points: Data enters the agent's context through user-supplied JSON files (e.g.,
steps.json) which are parsed inscripts/compute_step.py. - Boundary markers: There are no explicit boundary markers or instructions used to separate the data from commands or to ignore embedded instructions.
- Capability inventory: The skill possesses capabilities for dynamic code evaluation via
eval()and shell command execution viasubprocess.run(). - Sanitization: The
eval()implementation uses a restricted environment ({"__builtins__": {}}) to mitigate injection risks, though this does not provide a complete security guarantee.
Audit Metadata